Follow
Faysal Hossain Shezan
Title
Cited by
Cited by
Year
Privacy in repair: An analysis of the privacy challenges surrounding broken digital artifacts in bangladesh
SI Ahmed, S Guha, MR Rifat, FH Shezan, N Dell
Proceedings of the Eighth International Conference on Information and …, 2016
482016
Vulnerability detection in recent Android apps: An empirical study
FH Shezan, SF Afroze, A Iqbal
2017 International Conference on Networking, Systems and Security (NSysS), 55-63, 2017
322017
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
312020
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
Proceedings of the Web Conference 2020, 1006-1017, 2020
282020
Verhealth: Vetting medical voice applications through policy enforcement
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on interactive, mobile, wearable and ubiquitous …, 2020
162020
Side channel attacks in computation offloading systems with gpu virtualization
S Liu, Y Wei, J Chi, FH Shezan, Y Tian
2019 IEEE Security and Privacy Workshops (SPW), 156-161, 2019
142019
TKPERM: cross-platform permission knowledge transfer to detect overprivileged third-party applications
FH Shezan, K Cheng, Z Zhang, Y Cao, Y Tian
Network and Distributed Systems Security (NDSS) Symposium, 2020
112020
Detecting abnormal behaviors in smart home
Y Yu, C Li, MA Jonas, C Ma, FH Shezan, S Shen, P Gao, Y Tian
2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems …, 2019
62019
Privacy vulnerabilities in the practices of repairing broken digital artifacts in Bangladesh
S Guha, MR Rifat, FH Shezan, N Dell
Information Technologies and International Development, 2017
62017
The development of low cost exercise monitoring device for paralytic
SS Rahman, SS Nusaka, FH Shezan, MAR Sarkar
2015 IEEE International WIE Conference on Electrical and Computer …, 2015
62015
Categorizing defects in infrastructure as code
A Rahman, S Elder, FH Shezan, V Frost, J Stallings, LA Williams
North Carolina State University. Dept. of Computer Science, 2019
52019
High Performance Approximate Computing by Adaptive Relaxed Synchronization
B Islam, FH Shezan, R Shahriyar
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
42016
Towards Usable Security Analysis Tools for {Trigger-Action} Programming
MK McCall, E Zeng, FH Shezan, M Yang, L Bauer, A Bichhawat, C Cobb, ...
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 301-320, 2023
32023
NL2GDPR: Automatically develop GDPR compliant android application features from natural language
FH Shezan, Y Lao, M Peng, X Wang, M Sun, P Li
2022 IEEE Conference on Communications and Network Security (CNS), 1-9, 2022
32022
SAFETAP: An Efficient Incremental Analyzer for Trigger-Action Programs
MK McCall, FH Shezan, A Bichhawat, C Cobb, L Jia, Y Tian, C Grace, ...
Carnegie Mellon University, 2021
22021
Bugs in infrastructure as code
A Rahman, S Elder, FH Shezan, V Frost, J Stallings, L Williams
arXiv preprint arXiv:1809.07937, 2018
22018
ICTD 2016| Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh
SI Ahmed, S Guha, MR Rifat, FH Shezan, N Dell
Information Technologies & International Development 13, 14, 2017
22017
Poster: HeartFit: an intuitive smartphone application for well-being of hypertensive patients
SF Afroze, FH Shezan, S Sharmin
Proceedings of the 15th annual international conference on mobile systems …, 2017
22017
Perception Hacking for 2D Cursorjacking in Virtual Reality
Z Su, FH Shezan, Y Tian, D Evans, S Heo
12022
Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models
AG Chowdhury, MM Islam, V Kumar, FH Shezan, V Jain, A Chadha
arXiv preprint arXiv:2403.04786, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20